NCC Group Research Blog
LDAPFragger: Bypassing network restrictions using LDAP attributes
1 year 2 months ago
LeaPFRogging PFR Implementations
1 year 2 months ago
LAPSUS$: Recent techniques, tactics and procedures
1 year 2 months ago
Latest threats to the connected car & intelligent transport ecosystem
1 year 2 months ago
Launching the first in our series of Research Insights
1 year 2 months ago
Kubernetes Security: Consider Your Threat Model
1 year 2 months ago
lapith
1 year 2 months ago
Kerberos Resource-Based Constrained Delegation: When an Image Change Leads to a Privilege Escalation
1 year 2 months ago
Kivlad
1 year 2 months ago
Java RMI Registry.bind() Unvalidated Deserialization
1 year 2 months ago
Java Web Start File Inclusion via System Properties Override
1 year 2 months ago
Jenkins Plugins and Core Technical Summary Advisory
1 year 2 months ago
Jailbreak, updated and open-sourced
1 year 2 months ago
Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs
1 year 2 months ago
Jackson Deserialization Vulnerabilities
1 year 2 months ago
Jailbreak
1 year 2 months ago
ISM RAT
1 year 2 months ago
Ivanti Zero Day – Threat Actors observed leveraging CVE-2021-42278 and CVE-2021-42287 for quick privilege escalation to Domain Admin
1 year 2 months ago
iSEC reviews SecureDrop
1 year 2 months ago
Checked
3 hours 20 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed